| Automated Usability Evaluation of E-Learning Websites in Saudi Arabia |
| Khalid Al-Omar, King Abdulaziz University, Kingdom of Saudi Arabia |
| Volume : 7 volume number : 8 pdf |
| Godel Theorem is Invalid |
| J. Ulisses Ferreira, Federal University of Bahia, Brazil |
| Volume : 7 volume number : 8 pdf |
| Scalable and Efficient Pathsensitive Analysis Technique Scanning Many Types of Vulnerability |
| Dongok Kang and Minsik Jin, Fasoo.com R&D Center, Repulic of Korea |
| Volume : 7 volume number : 8 pdf |
| A Collaborative Coding Framework of RS and H.264 |
| Jiejun Hu and Xilong Che, Jilin University, China |
| Volume : 7 volume number : 8 pdf |
| Building a Text-to-Speech System for Punjabi Language |
| Rupinderdeep Kaur, R.K. Sharma and Parteek Kumar, Thapar University, India |
| Volume : 7 volume number : 8 pdf |
| Kurtosis : Is it an Appropriate Measure to Compare the Extent of Fat-Tailedness of the Degree Distribution for any two Realworld Networks ? |
| Natarajan Meghanathan, Jackson State University, USA |
| Volume : 7 volume number : 8 pdf |
| Dynamic Output Feedback Control for Sampled Data System with Actuator Saturation Using Quantized Measurements |
| Liuwen Li1, Wenlin Zou2 and Shumin Fei1, 1Southeast University, China and 2Nanjing University of Science and Technology, China |
| Volume : 7 volume number : 8 pdf |
| Securing Information Systems A New Approach |
| William R. Simpson, Institute for Defense Analyses, USA |
| Volume : 7 volume number : 8 pdf |
| Investigating the Implication of Big Data Analytics on Consumer Finance in China |
| Jiwat Ram1, Ding Ronggui1 and Hong Yang2, 1Shandong University, China and 2IBSS, China |
| Volume : 7 volume number : 8 pdf |
| An Energy Efficient Hierarchical Routing Scheme for Wireless Sensor Networks |
| Alaa Aadri and Najlae Idrissi, University of Sultan Moulay Slimane, Morocco |
| Volume : 7 volume number : 8 pdf |